Register
|
Login
Full Text
Author
Title
Submit manuscript
About
News
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2703)
Editorial
(411)
by Journal
by Funding Agency
Clear filters
Powered by
Articles
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Editorial
Editorial
Christian Gütl
10.3897/jucs.139725
28-10-2024
Unique: 283 | Total: 362
| Access Period:
1453-1454
HTML
PDF
Research Article
Recognition of Real-Time Video Activities Using Stacked Bi-GRU with Fusion-based Deep Architecture
Ujwala Thakur
,
Ankit Vidyarthi
,
Amarjeet Prajapati
10.3897/jucs.113095
28-09-2024
Unique: 557 | Total: 725
| Access Period:
1424-1452
HTML
PDF
Research Article
Cross-device Portability of Machine Learning Models in Electromagnetic Side-Channel Analysis for Forensics
Lojenaa Navanesan
,
Nhien-An Le-Khac
,
Yossi Oren
,
Kasun De Zoysa
,
Asanka P. Sayakkara
10.3897/jucs.109788
28-09-2024
Unique: 540 | Total: 725
| Access Period:
1390-1423
HTML
PDF
Research Article
Improving temporal behavior based on students’ traces in online-based learning environments
Houda Tadjer
,
Zohra Mehenaoui
,
Yacine Lafifi
,
Amira Chemmakh
10.3897/jucs.110356
28-09-2024
Unique: 531 | Total: 743
| Access Period:
1372-1389
HTML
PDF
Research Article
Accessibility Barriers for Blind Students in Teaching-learning Systems
Michele dos Santos Soares
,
Cássio Andrade Furukawa
,
Maria Istela Cagnin
,
Débora Maria Barroso Paiva
10.3897/jucs.106239
28-09-2024
Unique: 484 | Total: 681
| Access Period:
1343-1371
HTML
PDF
Research Article
Smart healthcare: developing a pattern to predict the stress and anxiety among university students using machine learning technology
Farhad Lotfi
,
Branka Rodić
,
Aleksandra Labus
,
Zorica Bogdanović
10.3897/jucs.116174
28-09-2024
Unique: 674 | Total: 999
| Access Period:
1316-1342
HTML
PDF
Research Article
Automatic Detection of Systemic Diseases to Recognize Mpox Virus using GPLNet Based on Skin Lesions
Panji Bintoro
,
Zulkifli Zulkifli
,
Yaya Heryadi
,
Fitriana Fitriana
,
Nopi Anggista Putri
,
Dwi Yana Ayu Andini
10.3897/jucs.119234
28-09-2024
Unique: 644 | Total: 919
| Access Period:
1286-1315
HTML
PDF
Editorial
Editorial
Christian Gütl
10.3897/jucs.137611
28-09-2024
Unique: 306 | Total: 381
| Access Period:
1284-1285
HTML
PDF
Research Article
Recognition of genuine and phishing emails may not be associated with response to phishing attacks
Alex Crgol
,
Simon Vrhovec
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.132113
14-09-2024
Unique: 667 | Total: 924
| Access Period:
1265-1283
HTML
PDF
Research Article
Using CVSS scores can make more informed and more adapted Intrusion Detection Systems
Robin Duraz
,
David Espes
,
Julien Francq
,
Sandrine Vaton
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.131659
14-09-2024
Unique: 491 | Total: 644
| Access Period:
1244-1264
HTML
PDF
Research Article
Bloom Encodings in DGA Detection: Improving Machine Learning Privacy by Building on Privacy-Preserving Record Linkage
Lasse Nitz
,
Avikarsha Mandal
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.134762
14-09-2024
Unique: 518 | Total: 682
| Access Period:
1224-1243
HTML
PDF
Research Article
„Stop it, Fridge!“ – Legally Secure and Interest-Based Data Sharing in the Age of Modern (Cyber) Technology
Dagmar Gesmann-Nuissl
,
Ines Maria Tacke
,
Stefanie Meyer
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.132132
14-09-2024
Unique: 461 | Total: 612
| Access Period:
1205-1223
HTML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK